Though biometric analytics have been around for a few years now, Apple and Samsung’s recent introduction of fingerprint readers to their newest mobile devices prove that biometric security systems are going to be more and more commonplace in the public sector. The research organization Goode Intelligence estimates that biometric authentication will be on most mobile devices by the end of 2015 and that by 2019, it will be used by 5.5 billion people worldwide. Familiarity with biometric analytics means ease of use for employees and consumers alike.

In fact, the scope of this attack differs from any we have responded to in the past, as its purpose was to both destroy property and release confidential information to the public. The bottom line is that this was an unparalleled and well planned crime, carried out by an organized group, for which neither SPE nor other companies could have been fully prepared.”

In the midst of mergers and acquisitions, there is still plenty of innovation and energy within the security industry, and enterprise security executives are in a position to benefit. As more and more end users attend the annual ISC West conference April 15-17 in Las Vegas, more focused solutions find their way to the forefront of booths, as manufacturers outline not only the technical aspects but the integration possibilities, risk mitigation benefits and problem-solving features of their new solutions for active end users.

Industry advancements that enable smartphones to carry credentials offer the opportunity for students, faculty and staff at university campuses to use a ubiquitous device to open doors and perform other tasks that require presentation of a secure credential.

Threated by the increasing ingenuity of hackers in addition to the already problematic challenges of employee theft or industrial espionage, organizations today are taking serious steps to improve protection of their networks and data centers.

It's cliché but true: One bad apple gives the whole bunch a bad name. When hiring new officers for private security, one untrained security officer can ruin both your company's brand and the reputation of the industry as a whole.

Launched in 2007, Operation Shield is an initiative of the Atlanta Police Foundation and the Atlanta Police Department (APD) to generate effective communication between the APD and both the public and private sectors and create a force multiplier for crime prevention and emergency preparedness. Through the Operation Shield Video Integration Center (VIC), APD officers are able to use software to monitor video feeds from both public and private sector cameras.

Bullying has become a hot topic in the last couple of years. Whether it’s because society has changed what qualifies as acceptable behavior in the workplace, on campus, and in schools or whether it’s because we are more aware of the negative psychological effects that bullying can have during all phases of life has not been determined. But the fact remains that we are becoming more cognizant of bullying and its effects on not only the target of the bullying, but also the bystanders who witness such behavior.

North Dakota college students are protesting a bill that would require issuing student ID cards with the student’s date of birth and address to create another acceptable form of identification for voting.

Multimedia

Videos

Image Galleries

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks?

In this March 2015 issue of Security check out our product preview of ISC West 2015. Also, learn how to make the best use of your security technology by working with your security integrator, get info on penetration testing, and discover how white glove security can enhance bottom line real estate value.

Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics.

Webinars

Dr. Bob Harkins will highlight the development of The University of Texas at Austin campus safety and security program by discussing the structure, the plans and programs, and the communications systems used at UT. This program oversees the day to day activities of 53,000 students, 17,000 staff and faculty and about 3,000 daily visitors. In addition to handling special events of more than 100,000 people, the campus safety and security team has reacted to a campus shooter, bomb threats, and a wide variety of other emergencies.

When responding to a security incident, time is of the essence. As you review your security plan for 2015, a critical component to address is your physical access control system. Get actionable tips that will allow you to take your access control system to the next level this year. The time is now to take your system to the next level.